Wednesday, November 27, 2019

21 Plutonium Facts (Pu or Atomic Number 94)

21 Plutonium Facts (Pu or Atomic Number 94) You probably know that plutonium is an element and that plutonium is radioactive, but what else do you know about it? Learn more with these fascinating facts about plutonium. Fast Facts: Plutonium Name: PlutoniumElement Symbol: PuAtomic Number: 94Atomic Mass: 244 (for the most stable isotope)Appearance: A silvery-white solid metal at room temperature, which quickly oxidizes to dark gray in airElement Type: ActinideElectron Configuration:  [Rn] 5f6  7s2 Facts About Plutonium Here are 21 useful and interesting facts about plutonium: The element symbol for plutonium is Pu, rather than Pl, because this was a more amusing, easily remembered symbol.  The element was synthetically produced by Glenn T. Seaborg, Edwin M. McMillan, J.W. Kennedy, and A.C. Wahl at the University of California at Berkeley in 1940–1941. The researchers submitted news of the discovery and the proposed name and symbol to the journal Physical Review but withdrew it when it became apparent plutonium could be used for an atomic bomb. The elements discovery was kept secret until after World War II.Pure plutonium is a silvery-white metal, although it quickly oxidizes in air to a dull finish.The atomic number of plutonium is 94, meaning all atoms of plutonium have 94 protons.  It has an atomic weight around 244, a melting point of  640 C (1183 F), and a boiling point of  3228 C (5842 F).Plutonium oxide forms on the surface of plutonium exposed to air. The oxide is pyrophoric, so pieces of plutonium might glow like embers as the outer coating burns. Plutonium is one of a handful of radioactive elements that glows in the dark, although the glow is from heat. Ordinarily, there are six allotropes, or forms, of plutonium. A seventh allotrope exists at high temperatures. These allotropes have different crystal structures and densities. Changes in environmental conditions readily cause plutonium to shift from one allotrope to another, making plutonium a difficult metal to machine. Alloying the element with other metals (e.g., aluminum, cerium, gallium) helps make it possible to work and weld the material.Plutonium displays colorful oxidation states in aqueous solution. These states tend not to be stable, so plutonium solutions may spontaneously change oxidation states and colors.  The colors of the oxidation states are as follows:Pu(III) is lavender or violet.​Pu(IV) is golden brown.Pu(V) is pale pink.Pu(VI) is orange-pink.Pu(VII) is green. Note this oxidation state is uncommon. The 2 oxidation state also occurs in complexes.Unlike most substances, plutonium increases in density as it melts. The increase in density is about 2.5%. Nea r its melting point, liquid plutonium also exhibits higher-than-usual viscosity and surface tension for a metal. Plutonium is used in radioisotope thermoelectric generators, which are used to power spacecraft. The element has been used in nuclear weapons, including the Trinity test and the bomb that was dropped on Nagasaki. Plutonium-238 was once used to power heart pacemakers.Plutonium and its compounds are toxic and accumulate in bone marrow. Inhalation of plutonium and its compounds increases the risk of lung cancer, although many people have inhaled substantial amounts of plutonium yet didnt develop lung cancer. Inhaled plutonium is said to have a metallic taste.Criticality accidents involving plutonium have occurred. The amount of plutonium required for critical mass is about one-third that necessary for uranium-235. Plutonium in solution is more likely to form critical mass than solid plutonium because the hydrogen in water acts as a moderator.Plutonium is not magnetic. Other members of the element group stick to magnets, but plutonium can have a variable number of electrons in its valenc e shell, which makes it difficult for the unpaired electrons to align in a magnetic field. The element name follows the trend of uranium and neptunium being named for planets outward from the Sun. Plutonium is named for the dwarf planet Pluto.Plutonium is not a good conductor of electricity or heat, unlike some metals.The alpha form of plutonium is hard and brittle, while the delta form is soft and ductile.Plutonium occurs naturally in the Earths crust in uranium ores, but it is very rare. The main source of the element is synthesis in reactors from uranium-238.Plutonium is a member of the actinide element group, which makes it a type of transition metal.

Saturday, November 23, 2019

How to Build the Best Social Media Promotion Schedule For Your Content

How to Build the Best Social Media Promotion Schedule For Your Content You know that creating amazing content takes a lot of time. When your content doesn’t get the views it deserves, though you wonder if it was worth the time. There is a simple fix for that problem. Sharing your content  on social media with a coordinated social media promotion plan. But, before you can get results, you need content thats worth sharing in the first place. Thats where this blog post comes in. You’re going to learn: How to understand what your audience wants  so you can create and share the right content to reach them. How to find shareable talking points in your content  that can easily be repurposed on social media. How to build a promotion schedule that maximizes traffic and shares. In short, what youll find here is a complete guide to creating and scheduling social promotion to maximize your contents value. How To Build The Best Social Media Promotion Schedule For Your ContentGrab Your Free Social Media Promotion Plan   Kit This kit includes three templates to help you plan and execute an effective content promotion strategy: Social Media Promotion Posting Schedule Template: Plan out how often youll post on each network. Social Media Calendar: Then schedule all your posts ahead of time in one place. Social Media Promotional Insights Report: Show your results with this simple reporting template. Get them all free now and execute the advice in this post more easily. ... Then Check Out the New and Improved ReQueue ReQueue is the industry's only intelligent social media automation tool, built into .And now it's improved and better than ever: Set it and forget it (with confidence):  Choose posts to reshare and let handle the rest. Reshare your best posts (with intelligence):  Never worry again about sending too many or too few posts. Customize sharing groups (with granular control):  Use Placeholder Groups to customize clusters of messages on the days and times you choose. Ready to try it yourself? Get it free for 14 days and start saving time on social media marketing now. Understand What Your Audience Is Going To Get Out Of Your Content You write your content based on one goal. That could be informing your readers of a new product, or sharing answers to frequently asked questions. Your audience reads your content because they’re being driven by a different goal. They could be looking to learn something new, gather information about your product, or explore more of what your company is about. Your content you share on social media should aim for the overlap between these two goals. But not just the content that you're planning on sharing with your followers. Your social media messages also play a role. By figuring out that intersection between your goals and your audience’s goals, you'll be able to write stronger messages that will drive them to the landing page, blog post, podcast or any other type of evergreen content that you’ve created. The second question you need to ask yourself is what is your audience going to get from your content? People are not going to care unless there's something in it for them. That sounds harsh but the reality is, your audience is going to ask what's in it for me? Your social media messages need to be able to answer that question and inspire them to click. Recommended Reading: The Easy 5-Step Content Plan Template That Will Make Every Piece Amazing Now that you know how to handle WIIFM and the goals behind why you created your content, you can begin to plan out your social media messages and create the right tone and conversation that encourages your audience to interact with your content. In essence, you're going to need to reread your content and pulling out the best talking points based on what your audience is going to get from your content. Things like: What will your readers leave knowing? What is a call to action that would drive them to click? What results should they expect to see after they read your content? Statistics, numbers, and quotes. Write Compelling Social Media Messages The first step in creating compelling social media messages involves tapping into the emotional side of your audience. It's at this point that you're going to dig deep and think about what's in it for them? Let's say for example that I wrote a blog post on creating inspiring Instagram content. I'd think about what my readers are going to get after they finish reading the blog post. That might include: How to think outside-the-box to execute more creative Instagram campaigns. How to increase engagement with better-quality photos. What's the optimal post frequency for the next network? Ultimately, they'll feel better prepared to rock at Instagram marketing, without spending hours of trial and error figuring things out themselves. Helping your audience build new skills while saving time? Sounds like a good goal to me! Once I had determined the benefit to my audience, I would aim my social media messages  at those takeaways. Suddenly you have clear benefits, a clear aim, and an emotional appeal to drive clicks to your content. Successful social posts have: 1. Clear benefit. 2. Clear aim. 3. Emotional appeal.How can you translate that into social media copy? In short, you have to maximize the few words that you have. This is where those talking points come into play. Ask yourself these things before you start: Is the message I’ve written  clearly communicating one of the talking points I selected earlier? Are my readers getting the best idea of what my content is about? Is this going to appeal to them in a way that will encourage them to interact with my content? Recommended Reading: The Best Social Media Copywriting Guide to Be a Social Word Ninja Create Messages Around Statistics From Your Content One way to create compelling messages is including statistics that you’ve compiled in your content. For example, when we were promoting our social media posting schedule we found out that we could help users increase their traffic by 192%. Now if someone told me that I could increase my traffic by 192%, I’d want to find out how. Here’s another example of another statistic that from our blog on content promotion tactics. Grow your traffic by 3,150% with tip #19 of 100+ blog promotion tactics. https://t.co/HCGhkxIrcr pic.twitter.com/kQQIzEuqPI (@) June 29, 2017 Statistics give someone a data point to fall back on because they’ve been backed by a process that is repeatable and they can prove those statistics to their team. Create Messages Around A Compelling CTA The second type of message that you can create promote your content involves creating a compelling CTA. Telling your audience what to do and what they're going to get out of your content is a great way to encourage clicks. For example, Hamilton creator Lin Manuel Miranda encouraged people to pick up the new karaoke soundtrack for Hamilton and record them singing along. The call-to-action in this case is to buy the soundtrack and sing along. Those karaoke parties?Theyre called #Hamiltunes.Go make one for free wherever you are!Read more: https://t.co/3hvyIrDDxz https://t.co/L5Bq45oqRx Lin-Manuel Miranda (@Lin_Manuel) June 30, 2017 Another great CTA social media message example is this Instagram post from Barnes and Noble. They’re maximizing their book sales by encouraging fans to check out a list of gift for graduates that they created. Need some tutoring to help figure out what to get the students in your life? Check out our collection of "Gifts Ideas for Every Graduate" using the link in our bio! A post shared by Barnes Noble (@barnesandnoble) on May 25, 2017 at 2:32pm PDT Create Messages Telling Your Audience What They’re Going To Get When They Read Your Content One of the best things you can do when you’re crafting your social media messages is to tell you audience what they’re going to be getting when they read your content. If I read a message that says I’m going to get 15 different ideas on how to style my hair in a hurry, I hope that’s what I get if I click on the article. That’s why misleading titles or clickbait drive everyone crazy. You’re not being honest about what they’re going to get from your content.

Thursday, November 21, 2019

World-class bull Case Study Essay Example | Topics and Well Written Essays - 250 words

World-class bull Case Study - Essay Example I believe that Sales VP Jeremy Silva has done justice to the strategy adopted by Knox for doing a successful business for the company, though I disagree with Silva in regarding Knox’s strategy as mere maneuver or trickery. I totally disagree with the human resources vice president’s view that Knox has breached the company’s ethics code and I feel that there is no coercion or manipulation done by Knox. Rather, he has just mixed his ability to persuade his customers through building a personal relationship and this effective strategy has done no harm to either party. James Borg, the business psychologist, and the author has an important point to make when he argues that Knox did not coerce Landry into buying SFS’s services, but instead simply got the CFO’s attention and let his persuasive techniques do the rest. It is totally true of fact, which becomes palpable in an insightful analysis of the case provided. Therefore, considering various aspects of the strategy adopted by Knox for the business of Armadillo Gas & Power with Landry, I strongly feel that Knox does not deserve a reprimand by the human resources vice president and I would demand rightful recognition of the success of Knox’s business strategy. When making a judgment regarding the business strategy adopted by Knox, one needs to recognize that he has been able to win a customer for the company through a positive strategy which builds trust in the customer about the company, along with developing personal relations with Knox.

Tuesday, November 19, 2019

Exemplification Essay Example | Topics and Well Written Essays - 500 words - 1

Exemplification - Essay Example If one just tries to analyze a sample of the varied computer games available in the market, it would turn out that they mostly happen to be a programmed version of the contemporary cultural icons, scarcely facilitating any opportunity for the exercise of imagination (Bennahum 78). These games are not only turning children away from the play grounds, but are also depriving them of the opportunities for the free play of imagination that playing in a group scenario, in the lap of nature, under the blue sky, surrounded by the stimulating presence of birds, animals, insects and plants could present. Considering the fact that most of the contemporary adults today prefer to opt for a career, parents today scarcely have the time and the inclination to go for an imagination rich parenting (Gilbert 146). They simply do not understand that buying the luxurious gifts simply could not take the place of things like camping with the child in the woods, telling fanciful bedtime stories while nudging the child to fill in the gaps in the plot with one’s imaginary ideas and creations, watching a spooky movie with the child and enjoying its momentary grip on her nascent imaginative faculties. Moments to exercise imagination are fast fading away from the family experiences of children. The irony is that modern education, which is supposed to polish and hone the imaginative faculties of the children, actually happens to fall short of such expectations. For instance, most of the academic institutions resort to very standardized curricula, turning a blind eye to the fact that strict regimentation of learning opportunities not only curbs the opportunities for the exercise of creativity and imagination, but sometimes snub imagination (White 7). A regular mathematics teacher will feel really irritated if a ten year old says that number 2 looks like a duck, or number 8 resembles a fat woman. No

Sunday, November 17, 2019

Ethical Standards Within the Healthcare Industry Essay Example for Free

Ethical Standards Within the Healthcare Industry Essay ABSTRACT   Ã‚  Ã‚  Ã‚   This research functions as an analysis of the essential similarities and differences between the ethical standards upheld by the health care sector and the non health care sector. The health care sector includes hospitals, clinics, and private practices while the non-health care sector includes commercial, technological, industrial and other sectors. The paper discusses regulations and legislation of ethical practices and finds that the extent to which ethics and law overlap is dependent on such factors as the type of harm that can be done to citizens as a result of an action. The paper also discusses the extent to which the administration of ethical rules takes place within the sectors in question.   Ã‚  Ã‚  Ã‚   It posits that the health care sector maintains a high standard in ethical practice, especially in the medical, pharmaceutical and a few paramedical fields. It distinguishes as well as defines clearly the concept of ethics and law and how they are legislated in a few selected establishments. Meticulous care has also been taken to probe and illuminate the nuances of the controversial disclosure law and to give insight into the strong ethical question that it addresses in the health care industry. Equally, the issues concerning the consent and privacy rules were also dealt with in an in-depth and comprehensive manner. In addition to this, the paper explains the several ways in which information can be protected from physical and electronic abuse. It also delves into the areas of weakness and threat faced in technological security.   Ã‚  Ã‚  Ã‚   The ethics of the health care and the non health care sectors were also examined through these lens of technological security, and analysis was done of the methods used by each sector to secure information. Finally, the implications of this research outlined at the end of this report and recommendations are then given for improving ethical practice. The researcher suggests ways of improving the quality of ethical standard in the major health sector as well as other branches like the paramedical. Furthermore, the recent developments in electronic assessment and the dissemination of business information are shown to create a need for both regulation and legislation. There is a demonstrated need for simplification of all ethical legislating and regulating information so that such might be made available to everybody who desires to learn and abide by ethical standards. Chapter 1 INTRODUCTION BACKGROUND   Ã‚  Ã‚     Ethics is a philosophy of life and became a part of the business world. The complexity and critical needs of the health care industry are more prone to medical errors which could cost human lives. The quality of care is measured by ethical factors related with the medical industry. However, ethics go beyond quality of care and include many other areas in the health care industry. The role of health care administration in the organization is to ensure that customers are protected completely and that their privacy are not violated.   Ã‚  Ã‚  Ã‚     The practice of ethics is also one of the duties and responsibilities of the Health Care Administrator and as such, the present paper aims to identify the position and practice of ethics in the health care industry with other non health care industries. In doing so, the paper intends to gain insights of ethical practices of non-health care industries and tries to recommend the best practices for the health care industry if gaps are found. In order to evaluate the key issues of ethical practices in both sectors, the paper considers the Information Security aspect of business Information.   Ã‚  Ã‚     Thus, the paper aims to compare the ethical practices mainly concentrating in the primary areas of information Privacy and Security from health care and the E-commerce sectors. Every responsible activity in any organized sector of human endeavor requires some form of regulation. Whether it is written or unwritten, legally documented or morally documented, the study also tries to observe the ethical practices against the industry specific ethical standards and legal policies.   Ã‚  Ã‚  Ã‚   Ethics can be defined as learning of what is right or wrong and then doing the right thing. Generally, ethics are aimed at the employees of organizations whose management experienced problems. LAW AND ETHICS   Ã‚  Ã‚  Ã‚   The Legal Information Institute (1999) defines â€Å"law† as a set of rules that are considered universal and that show both internal and external consistency. They are publicized and are usually accepted by the society in which they are published. They should also be enforced. Such laws are regulations that govern how persons in a given society are expected to behave toward others, who make up the society, and standards the persons who live within that environment are required (and not just expected) to adhere to. The government is responsible for enacting such laws, and is empowered to use security forces to ensure these laws are enforced. Sue Anstead (1999) has identified five following criteria that must exist for laws to be considered as such: consistency, universality, publication, acceptance, and enforcement. First, Consistency refers to the idea that contradictory requirements cannot be considered law, as it would be impossible for people to obey both. Second, universality demonstrates that the requirements should apply to all who share similar situations within a given society. Third, publication promotes the idea that the requirements should be available to all via some method of written publication. Fourth, acceptance means that the requirements must be generally considered appropriate. When acceptance of the law occurs, it will be nearly universally obeyed. Finally, the enforcement criterion reflects the idea that the members of the given group must be forced to comply with the regulation and punished should they choose to disobey.   Ã‚  Ã‚  Ã‚  Ã‚   Anstead (1999) has also noted that the Greek word ethos is that from which the English word â€Å"ethics† is derived. The Greek word is one that means character, and the Latin equivalent of same words adds the idea of custom to the meaning of the term. The combination of these ideas reflects the choice that people within a society make regarding their mode of interaction. The philosophical rendering of the word â€Å"ethics† gives the definition as that which is good or wholesome for the person as well as his social environment and it also describes the duties that should be performed from one person to another.   Ã‚  Ã‚  Ã‚  Ã‚   Ethics has many philosophical traits that one might describe as â€Å"common† to all forms of the term. It is concerned with the apprehension of things considered acceptable—or the distinguishing of right from wrong. Furthermore, ethics are designed compel the individuals to choose the right over the wrong. Decisions that are considered ethical are generally attended by consequences that extend over a discernible period. There are also generally several options regarding behavior, so that a person must make a choice to be ethical in his/her behavior.      Ã‚  Ã‚  However, ethics are not considered to be the same as morality. The difference that lies between them is delicate but important to learn   and understand. Judgment is at the heart of morality, as it has to do with certain â€Å"standards of behavior by which individuals are judged, and [†¦] which people in general are judged in their relationships with others (Anstead, 1999).† Ethics, however, differs from this as it encircles the entire belief system upon which a certain version of morality rests. The values connected with ethics and those principles one finds in conjunction with the law are generally related to each other. However, ethical responsibilities are often greater than legal ones. However, the opposite is also true at times. As a matter of fact, it might be said that â€Å"although law most times embodies ethical principles, law and ethics are far from co-extensive (Ibid).†   One finds that no laws exist against certain actions that may be considered even by many as unethical. On the other hand, the law does prohibit some acts that are not considered unethical but may just be dangerous. Examples of these abound, but just to name a couple: making false claims about a certain situation or betraying the trust of a friend is, in most cases, not considered illegal. However, such an act is almost universally considered unethical. Similarly, speeding is against the law, though many would agree that most people do not find such an action unethical (AMA, 1994; Anste ad, 1999).   Ã‚  Ã‚  Ã‚   McNamara (1999) has described a scenario in which the relationship between law and ethics is depicted. When setting up a set of criteria or guidelines that help in the detection, resolution, and the warding off or discouragement of breaches to ethical codes, an organization is often secured against involvement in further legal problems. According to Anstead (1999), â€Å"Federal sentencing guidelines passed in 1991, for example, permit judges to reduce fines and jail time for executives proportionate to the ethical measures a company has taken (Ibid).† This makes it a wise decision for any company to take time to develop a code of ethics. If an organization develops positive methods for dealing with situations concerning ethics, this will give them the opportunity to extend mitigated punishments, in the event that legal violations do occur.   Ã‚  Ã‚  Ã‚   Guidelines or codes that govern the conduct of individuals, and which are of the sort that is universally agreed upon as good actions, should be provided to the public in written form within a document. Such a document must be observed and upheld as one containing principles that are designed to guide the public (Anstead, 1999). At this point, the document should then be transformed into law. In several contexts, and especially in non-healthcare situations, one finds that the law contains no real documented types of ethical legislation. A person is generally viewed as being capable of and willing to exercise ethical conduct within a given scenario as the need arises. However, no general effort is usually placed into predicting the types of scenarios in which ethics might play a part, as well as the types of ethical behaviors that might be required. As a result, no systematic code of ethics has been captured and written down for several industries outside of the healthcare industry (Anstead, 1999). Many laws have been drafted and put into place, guarding against harm to employees and other modes of unethical conduct in the working environment. The Department of Labor is responsible for the administration of such laws within the United States. However, they are generally reflective of ethical benchmarks adhered to by most persons and organizations within society. Laws that perform such duties include the Americans with the Disabilities Act of 1990 (ADA). The ADA (1990) has stipulated the following: No covered entity shall discriminate against a qualified individual with a disability because of the disability of such individual with regard to job application procedures, the hiring, advancement, or discharge of employees, employee compensation, job training, and other terms, conditions, and privileges of employment (ADA, 1990).   Ã‚  Ã‚  Ã‚   It would not be against the ethical standards of most to admit that the denial of employment, promotions, or other benefits to a person with a disability would be wrong once that denial is based only on the fact that the person carries that handicap. This is especially true when the disability in question poses no impediment to the proper completion of the task required by the job. Ethics in the workplace also extends to the business person who finds himself under no legal obligation to refrain from divulging information given to him in private by a colleague. This is in direct opposition to the kind of confidentiality required in the healthcare system. Medical professionals must adhere to strict guidelines concerning the sharing of information about patients’ medical conditions (Agelus, 2004; AMA, 1994). In doing this, these professionals adhere both to ethical as well as legally binding guidelines. ETHICAL RULES FOR EMPLOYEES   Ã‚  Ã‚  Ã‚   Employees that work within corporations and at executive levels are held to guidelines that are usually termed â€Å"ethics standards† (Anstead, 1999). The sources from which these guidelines are obtained as statutes concerning â€Å"criminal conflict of interests† and those concerning â€Å"administrative standards of ethical conduct† (Ibid). It is by way of such statutes that the government itself has become involved in the enforcement of ethical behavior within the corporate world (Budd, 2005).   Ã‚  Ã‚  Ã‚   The United States has a Criminal Conflict of Interest Statute, and the ethical nature of this law can be reflected within the United States Code. This statute bans such behavior as employees performing such actions that show their own interests to be given priority over that of the Federal government itself. It is known that obtaining information within a business setting is for the purpose of protecting the interested parties equally. In the healthcare industry, this refers to the doctor and the patient. In these scenarios, it becomes in the interest of all persons involved that information divulged in private remains confidential (AMA, 1994). Part 2635 of the Code of Federal Regulations exemplifies standards of administration as stipulated by the Ethical Conduct Regulation. According to Anstead (1999), â€Å"The standards of conduct regulation establish principles of ethical conduct for employees within the executive branch and the regulation not only identifies the principles but also provides easy to understand examples of how the principles apply (Ibid).† These guidelines that govern conduct refer to such actions as how to handle the receipt of gifts obtained from sources outside the organization; how to regulate the exchange of gifts between one employee and another; how to mediate conflicts of interests in financial situations; the removal of biases when conducting official business; how to go about finding alternate employment; the proper handling of a position of authority; how properly to balance activities outside and inside the organization. CODE OF ETHICS   Ã‚  Ã‚  Ã‚   Companies and organizations within the private, non-health sector often set up their own ethical guidelines in addition to the already established guidelines provided by the government. These guidelines may be written in a formal manner, or just informally understood among those persons involved. It is usually up to these private bodies to enforce such codes, as the government is generally not capable. When these codes are violated, employees or members within the organization or group may have their employment terminated.   Ã‚  Ã‚  Ã‚   Within the healthcare industry, as well as in any related sector in which humans are heavily involved in research, strict rules generally govern the actions of the professionals involved. One example of the strictness of such rules is found in the ethics that govern the carrying out of experiments that involve human subjects. Such research is carried out in hospitals, clinics, and even in universities around the world. In such cases, ethics and law work hand-in-hand, and the idea of consent (which shall later be discussed in further detail) form a large part of that research.   Ã‚  Ã‚  Ã‚   The principle concern of all ethical research done on humans is the offer of informed consent to the subjects who participate in that research. This is defined by the researchers’ granting respect and justice to those being studied (Schrag, 1979). Such research methods that include deception, covert observation, or any other type of concealment regarding the use of information or purpose of the research is considered to be unethical. In some cases, however, it might be necessary that participants be recruited, who are unaware of certain aspects of the processes involved in the study. In such cases, an institutional review board or ethics committee must be approached, and accommodations made, to satisfy the committee’s stipulations of certain aspects of the project that may require deception (NHMRC, 2001). STATEMENT OF THE PROBLEM   Ã‚  Ã‚  Ã‚   In the main, this paper seeks to examine from a manager’s point of view, the ethical standards of securing business information in the healthcare industry and in comparison with the ethical standards of securing business information in the non-healthcare industries. As such, this paper intends to answer the following specific questions: What are the ethical standards of securing business information in the healthcare industry? What are the ethical standards of securing business information in the non-healthcare industries? and What is the comparison between the ethical standards of securing business information in the healthcare industry and the non-health care industries? HYPOTHESIS   Ã‚  Ã‚  Ã‚   The ethical standards of securing business information in the healthcare industry are more rigid and standardized compared with the ethical standards of securing business information in the non-health care industries. OBJECTIVES OF THE STUDY   Ã‚  Ã‚  Ã‚   This paper is written in order to achieve the following objectives from a manager’s point of view: To determine the ethical standards of securing business information in the healthcare industry; To determine the ethical standards of securing business information in the non-healthcare industries; To compare and analyze the similarities and differences between the ethical standards of securing business information in the healthcare and non-health care industries; and To recommend for policies or managerial improvements based upon the analysis and implications of the comparison of ethical standards in the healthcare industry, and non-health care industries.   METHODOLOGY   Ã‚  Ã‚  Ã‚   In this study, the literature search is considered to eliminate the possibility of needless duplication of the outcome of the study. The study found that there is no evidence that a comparative analysis of ethical practices was conducted in the health care and e-commerce industries. Hence the study started analyzing the ethical practices in both the industries to make a recommendation to the health care professionals.   The study found that literature review saves considerable time by building on what is already known as well as using tested methodology, including instruments. The study progresses by assessing the merit of previous studies: their soundness, relevance, design quality, findings and conclusions.   Ã‚  Ã‚  Ã‚   The literature research, especially in the findings and recommendations of others, often provides more and more persuasive justification for research on the problem. Previous researchers often identify gaps or areas where more research is needed. Besides enlarging the knowledge about the topic, the method allows to gain and demonstrate skills in areas such as: Information seeking: the ability to scan the literature efficiently, using manual or computerized methods, to identify a set of useful articles and books, and Critical appraisal: the ability to apply principles of analysis to identify unbiased and valid studies.   Ã‚  Ã‚  Ã‚   The Literature is collected from Journal articles, books, Government reports, Theses, Internet articles and online magazines. Each of the sources has its own contribution to the paper. Journal articles were used for their up-to-date and concise information. Books were reviewed to have a basic ground theory and to collect facts on ethical practices. Government and corporate reports were studied to understand the relevant policies and legal frameworks for the ethical practices of the industries considered for the study. Theses and research papers were reviewed to understand and compare the knowledge gained in similar fields by authors and scholars.   Internet articles and online magazines were studied to review the application areas of the study in recent times to gather different opinions and illustrations. ORGANIZATION OF THE STUDY   Ã‚  Ã‚  Ã‚   This paper is organized and structured in accordance with the American Pyschological Association (APA) format. Chapter one discusses the introduction and background of the study including the statement of the problem, hypothesis, and its objectives, and methodology. Chapter two reviews the literature which is also the main research method in data gathering as well as in the preparation for analysis and discussion.   Ã‚  Ã‚  Ã‚   Chapter three analyzes and discussed the ethical standards of gathering information in the healthcare and non-health care industries. Finally, Chapter four concludes and make recommendations. Chapter 2 REVIEW OF LITERATURE DISCLOSURE LAW AND SECURING INFORMATION   Ã‚  Ã‚  Ã‚   It must be agreed that the health sector is one of the most delicate and even complicated sectors of the national economy, and that it requires handling with utmost care. It is intimately concerned with handling the most delicate areas of personal information, as it is involved in the documentation of health records, and the treatment and handling of all ailments suffered by persons within society. So, the management of healthcare data requires competence and very high standard of ethics (Agelus, 2004). So here what must also inevitably be considered is the question of drafting laws and regulations to govern how this information can be secured in the best interest of the stakeholders (Morejon, 2006). Of importance is the question of what the ethical rules are which govern security of these data and information. Also of importance is the protection of the rights of all concerned, and this is what shall be explored here. Sage (2000) has identified the fact of the extreme popularity of laws that require physicians, hospitals, and other healthcare organizations to give extensive disclosure privileges to patients and customers.   He continues: The reason for this lies in politics, not policy: disclosure laws suggest a less intrusive role for government and greater reliance on individual choice and free markets than do other oversight mechanisms. This strikes   responsive chord in todays anti-regulatory political climate. At a policy level, however, few healthcare disclosure laws have been carefully designed to achieve specific objectives (Sage, 2000).   Ã‚  Ã‚  Ã‚   An interesting and important way in which this process in which regulations are diversified is able to manifest itself is though the popularity of these disclosure laws. (Morejon, 2006). Researchers have expounded on this matter by showing how patients have been requesting extensive information about their health records in direct response to the widening scope of managed healthcare (Marshall et al., 2000).   Ã‚  Ã‚  Ã‚   It has also been applied to regulation ensuring the quality and safety of hospitals and physicians as well as to the laws that are responsible for the decisions made by patients concerning their treatment. The main issue that is currently being faced in the healthcare sector with the laws concerning disclosure is that they are not focused. In the words of Sage (2000), they are â€Å"scattershot, reflecting short-term political compromises or the equities of individual lawsuits rather than a coherent understanding of the purposes served by mandatory disclosure and the conditions necessary to achieve desired effects.† So it is obvious that managing and securing business information is a whole lot of serious issues. In spite of this fact, persons who advocate disclosure are usually quick to point toward such laws issued concerning federal securities as models for healthcare disclosure laws. Their argument is that Congress should carve out for the healthcare industry ethical regulations that are similar to those drafted and enforced by the Securities and Exchange Commission (SEC) or by other financial agencies, such as the Financial Accounting Standards Board (FASB). Sage (2000) agrees that these boards do have the ability to illuminate some of the issues regarding ethics that face the healthcare sector. However, Sage goes on to point out that â€Å"well-designed information requirements can serve therapeutic goals regarding openness, trust, and participation and can remind physicians and other health professionals of the tensions between their daily practice environment and their overarching ethical obligations (Sage, 1999).† Therefore, in order to design fitting ethical standards and reg ulations, the particular idiosyncrasies of the healthcare industry must be taken into consideration.   Ã‚  Ã‚  Ã‚   It is the job of the government to collaborate with the healthcare personnel to establish a hierarchy of actions through which ethical standards might be met. This will necessitate the prioritizing of such issues as education of the public and overall improvement of performance in as far as social issues may have a bearing on decisions made in healthcare. Furthermore, financial considerations should not have too great a bearing on the privacy and self-determination rights of citizens (Hsinchun et al., 2005). These are some of the basic issues that must be kept in mind in understanding the important role the healthcare sector is playing in securing and managing information. Another dimension of ethics exists in the form of economic theory, and in this dimension, no rule exists which stipulates that all consumers must necessarily be completely informed in order that efficiency exist in the sector (Baird et al., 1994). In fact, according to Sage: The SEC has had to accept the fact that the meaning of intricate corporate disclosure may elude unsophisticated recipients, especially as larger segments of the population purchase securities. It has become obvious that, the absence of a secondary market pricing mechanism in healthcare reduces the ability of a few sophisticated parties—such as large employers or government purchasers—to discipline the entire market and those few have smaller incentives to achieve informational superiority (Sage, 2000).   Ã‚  Ã‚  Ã‚   In the opinion of Baird et. al. (1994), â€Å"overcoming the current degree of public ignorance is [still] a weighty challenge for a disclosure regime. This is particularly true because the least educated users of healthcare often have the greatest health needs and are vulnerable both to risk-selection in insurance and to substandard provision of care (Baird et. al., 1994).† The federal security laws establishing disclosure law, as pointed out by Sage (1999), has suggested three core reasons for its necessity, which are to (1) Facilitate market competition; (2) Monitor agents and intermediaries; and (3) Improve corporate governance. The researcher has seen fit to take the time to explain what these disclosure law is as it is considered the basis upon which rests a healthcare officer’s ability to comply with his ethical demands. Again, â€Å"it can serve varied and sophisticated purposes, but only if objectives are clearly articulated and laws carefully designed to achieve them (Sage, 2000).† Dealing with the science of human even veterinary medicine without properly enabling regulatory laws will only lead to frustrations and conflicts (Agelus, 2004; AMA, 1994). This is the foundation and   understanding upon which this research is based. ETHICS IN BOTH INDUSTRIES Every sector in the health delivery field has governing ethical standards that regulate its operations, be it theoretical, clinical, paramedic or even veterinary sectors. Regardless of the different departments, the governing ethical rules are basically very similar. Therefore, bodies exist for the purpose of overseeing and managing, as well as securing the interest, survival and maintenance of these ethical standards. In the same way, the non healthcare sector (covering such fields as technology, law, business, commerce and sports) have their own ethical standards by which all companies are expected to act (Agelus, 2004; Budd, 2005). The stringency of laws that back these ethics, however, tends to differ between the two sectors. Every one who operates in the field of life has a moral or compulsive obligation to play by the rules, and every organized body is governed by sets of rules. These might be rules concerning financial management, training, membership, and qualification for certification in certain fields. These rules all involve the regulation of standards of practice and may be as diverse as the scope of the organization itself. The fact and reality to be noted here is that every member, and all those who desire to be responsibly associated with such a body, must abide by the ethics of such profession in good conscience, and may even be willing to be reprimanded and disciplined when the need calls for it (Baird et al., 1994). For example, lawyers believe that advertising their profession will have dire consequences (David, 2005). So it is expected that no lawyer will be so hungry for patronage as to put up an advertisement to improve his number of cases handled. Professionally that would be unacceptable. In instances such as this, a violation of an ethical standard does not constitute a punishable offence, but would be regarded as a moral burden on such an individual. If it is agreed that lawyers must appear noble, if a â€Å"deviant† lawyer decides to publicly put up an advertisement in the papers or electronic media, there is no law that recommends prosecution. Colleagues, however, may look down on him, or at least see his actions as contemptuous. On the other hand, a civil engineer who opts to carry out an inferior job for a client may go unnoticed for a while. But if, by chance, such a building collapses over time, he may be sought out and may face possible prosecution. However, the reality is that certain ethical standards hardly have strong backing from the law enforcement agencies. The reason for this is that many are merely regulations and unwritten codes of understanding (Anstead, 1999). On the other hand, most health sector fields are very strict in adherence and implementation of their ethics of practice (AMA, 1994). The reason is quite obvious. The health sector has very strong relationship with maintaining human life, human health, hygiene, animal life, environmental concern, etc. So laxity, negligence, deliberate omission and commission may lead to casualties and unintended sad consequences. It could be conceded, therefore, that the ethics in the healthcare sector has a much stronger backing than its counterpart in the non-healthcare sector. For instance, a doctor who violates his code of practice, or carries out action that is not in conformity with the rules of practice will stand the risk of having his license withdrawn In his preface to his book, The Ethics of Human Resources and Industrial Relations, J.W. Budd, had this to say: In the business and economic spheres, many of the most pressing ethical issues involve the employment relationship, such as the rights of employees versus ER shareholders, employee privacy and monitoring, whistle blowing, pay equity, discrimination, employee safety, anti-union campaigns, and minimum labor standards. Since the field of human resources and industrial relations is ultimately about people and quality of life, there is a pressing need to develop applications of business ethics for the employment relationship in the context of research, practice, and teaching (2005, p. 1).   Ã‚  Ã‚  Ã‚   In following the media coverage of the many scandals which have plagued countries throughout the world, the public has gained a greater understanding of what can happen when businesses do not adhere to ethical practices. Many scholars of business ethics consider that it is now time for the human resources and industrial relations communities to explore the application of ethics to the employment relationship and to discover the importance of treating employees, not just numbers, properly. This goes to show that the issue of observing ethics in profession is gradually taking a more serious dimension (Marshall et. al., 2000; Sage,   2000). POSSIBLE CONFLICTS   Ã‚  Ã‚  Ã‚     It has already been emphasized that certain beliefs and actions may be perfectly legal, but might yet be considered unethical. One organization, the Marriot Corporation, holds itself and its employees to some very high ethical standards (Anstead, 1999). In fact, certain aspects of the company’s standards might be said to be overdone. However, in the pursuit of comprehensive ethical standards, the dress code, for example, had once included certain stipulations that might today even be considered unethical. This had to do with the appearance of its employees while on the job, and on some level extends itself into areas that differentiate the sexes in what might be considered inappropriate ways today.   Some stipulations were (1) Prohibition of women from wearing skirts that go higher than about four inches above knee level; (2) Prohibition of women from showing bare legs and the requirement that they wear panty hose or long pants always; (3) Prohibition of women from wearing clothing that exposed their shoulders; (4) Prohibition of men from wearing their hair at a length that touches or goes beyond the collar without having express religious reasons for doing so; and (5) Prohibition of men from wearing certain types of jewelry, such as earrings. Despite the fact that such rules were considered binding within the confines of the company itself, nothing regarding them had anything to do with legal status at a judicial level. Still, within the culture of the Marriot Corporation, behaviors that went against the established codes were considered unethical (Anstead, 1999).   Ã‚  Ã‚  Ã‚   There is also no law exists that prohibits companies from outsourcing their manufacturing jobs for the sake of profit. Furthermore, though minimum wages might differ greatly between the host country and the United States, corporations are not bound to meet anything more than the minimum wage requirement of the host country in order to remain unsusceptible to legal action.    Succinct with to the two aforementioned examples, other practices (though lesser in degree by comparison) demonstrating illegal actions might be considered ethical by the majority of the public. The removal of office supplies at ones place of employment for personal use is one such example. Another is the installation of a copyrighted program on multiple computers within a company. Technically, such an action is in violation of intellectual property and other copyright laws (Budd, 2005; Software Use, 1999). Despite this, â€Å"the piracy of software is widespread, even in corporations that con sider themselves ethical† (Anstead, 1999). Like the healthcare industry, the software community has plenty of legal backing when it comes to the proper use of its products. Unlike the healthcare community, however, many breaches to the legal guidelines take place and little is (or can be) done to prevent this. One reason for this is that such illegal conduct is difficult to detect and control, and such widespread software knowledge exists that hackers may be able to get around security measures, further complicating the matter.   Ã‚  Ã‚  Ã‚   Copyright law enacted by the Federal government seeks to protect software creators as soon as the product has been developed. Title 17 of the United States Code concerns the Copyright Act, see 17 U.S.C.A.  § 102, and accords exclusively to the developers and owners of software the right to reproduce and disseminate the work in question. Anyone found to encroach upon the rights of the owner of the copyright is subject to penalties, and those who purchase a copy the software has license only to put the software on one computer and create a back-up copy for the purposes of archiving it.   Ã‚  Ã‚  Ã‚   The discrepancy one finds between the sentiments of different persons concerning software piracy is akin to the delicate difference between what is legal and what is ethical. Many people are adamant in their belief that certain illegal uses of software are indeed ethical. Yet, the financial impact that such piracy has globally is significant. One study has shown that in 1998, approximately 38% of all software installed in businesses worldwide was pirated, and this amounted to a reduction in profits of approximately $11 billion (SILA, 1999).   Ã‚  Ã‚  Ã‚   When one considers the management of a non-healthcare businesses, it becomes clear that rules governing ethical practices are less stringent than those within the healthcare industry. Ethics are not compulsory, though it usually benefits the company to demonstrate ethical practices. The relationship between law and ethics becomes evident here again, and such a relationship is of immense importance in the area of management. It is one of the duties of managers to assess both what is considered legal and what is considered ethical in the running of their businesses. It is the job of managers, therefore, to ascertain whether employees and the company as a whole abide by the legal statutes and societal standards concerning ethics. Also important here is the evaluation of what is considered acceptable and ethical behaviors by customers—as they also must be satisfied as much as managers and employees are with the ethics of the company (Budd, 2005). It is of course true that no policy developed to secure ethical standards will be satisfactory to all concerned. However, managers have the responsibility of establishing the most comprehensive code of ethics possible given the information currently available to him or her. The code will have the advantage of demonstrating to employees, customers, and society alike that the company is at least concerned with the ethical practices of those who do business in and with it. In this way, businesses outside the health industry do themselves a favor by demonstrating ethical practices above and beyond their legal obligations. However, within most non-healthcare sectors, such attention to ethics is not mandatory (Budd, 2005).   Pains have been taken to go through the above details for the purpose of making it possible for readers to appreciate what and how ethics apply in other aspects of life. However, this study will be limited to the healthcare and non healthcare industries, focusing on their ethical standards in securing information. ETHICS AND PRIVACY   Sometimes, people may act deliberately to defy the written and unwritten codes of ethics within their line of work in the organizations. This may be done through deviant means, such as sophisticated electronic devices that facilitate the bugging or taping conversations that were never meant to be recorded. It appears that such actions occur more in the business world than in the health world. It is not, for example, common to hear of health workers engaging in such extreme activities in order to gain access to information of a delicate and private nature. However, one does hear of other forms of ethical breaches in the health sector and the pharmaceutical industry. Some scientists may also attempt to misrepresent the results of clinical trials for similar reasons. Such actions are unethical as they may eventually prove harmful to the public at large (Bassett, et al., 1992; Girotra, Terwiesch Ulrich, 2006).   Ã‚  Ã‚  Ã‚   The issue of consent according to the Privacy Rule, states that workers and establishments in the healthcare sector, such as physicians, hospitals and clinics must receive consent from patients or other clients before compromising or turning over to a third party information concerning that person’s state of health. Such permission must be given in written form prior to the disclosure and before any form of treatment or other operation can be performed (Sage, 2000). Currently, it is the practice of healthcare providers to â€Å"obtain a patients consent for disclosure of information to insurance companies or for other purposes (DHHS, 2001, p. 4).† This is done for reasons having to do with ethics and professionalism. The Rule itself has as its foundation these said practices, and these rules are eventually expanded for the purpose of having a uniform system by which workers in the healthcare sector can systematically gain consent for the procedures nece ssary to ensure the proper treatment of patients (DHHS, 2001; Hsinchun et al., 2005). GENERAL PROVISIONS   Ã‚  Ã‚   According to McNamarra (1999), the general provisions for ethical standards in the healthcare industry are as follows:  Ã‚   It is necessary for patients to give consent prior to being treated by health care provider that offers direct treatment to that patient. Such a health care provider may utilize or share protected health information (PHI) only for purposes of TPO. Exceptions to this standard are given subsequently; When an emergency arises (such as in the event of life-threatening accidents or communication barriers), it is possible for health care workers to use and disclose information concerning a patient without first having obtained his/her consent. This is especially true in the health care sector, where laws require that workers treat patients that come into their care; Certain members of the healthcare community whose employees have very minimal contact with patients, such as persons who work in laboratories, may use or disclose information concerning those patients without first obtaining their consent. Other organizations within the health care sector, such as health insurance agencies and clearinghouses also have the privilege of using or divulging patients’ information without gaining consent. These agencies do have the option of getting this consent if they wish to do so—but it is left to their discretion; Health care providers have the right to refuse treatment to any patient who fails to grant permission for disclosing their protected health information. It is not necessary for such consent to be obtained by more than one provider at any given time; and There is no real need for the document that gives consent to be an in-depth one. Such permissions may be given in very general language. The language must, however, be plain enough to be easily understood. It must also contain all that is necessary to make it clear to the patient that any information that is provided might be shared and that he/she does have the right to refuse, impose restrictions, and to peruse the privacy statement of the organization. The consent may be a brief document in written from with general terms. Any such statement must then be signed and dated by either the patient himself or the patient’s proxy (McNamara, 1999). INDIVIDUAL RIGHTS   Ã‚  Ã‚  Ã‚     Individuals have the right to revoke statement of consent except when the health care provider has already acted in response to the consent. Restrictions may be imposed upon the permissions for disclosures and uses of protected information. The provider is not obligated to agree to these restrictions, but must abide by those to which it does agree (McNamara, 1999).   Ã‚  Ã‚     Patients must be privy to the privacy codes of the entity to which he/she gives permission to use or disclose information—and such access to the privacy code must occur before signing consent forms (Ibid). ADMINISTRATIVE ISSUES According to the Department of Health and Human Services (DHHS), any consent form that is signed by a patient must be kept by the health care provider (or other entity) for a period of six years following its last effective date. The forms may be retained in paper form, electronically, or otherwise—this is left to the discretion of the provider.   Ã‚  Ã‚  Ã‚   Further provisions for privacy and consent have been issued, which stipulate that if a covered entity obtains consent and also receives an authorization to disclose PHI for TPO, the covered entity may disclose information only in accordance with the more restrictive document, unless the covered entity resolves the conflict with the individual. CONSENT VERSUS AUTHORIZATION â€Å"Consent† is the name given to any document that accords to health care personnel the permission regarding the usage and disclosure of delicate information regarding a patient. This permission is granted solely to the particular health personnel (Sage, 2000). It is not necessary that the consent form be specific about the type of information that will be used included in the disclosure (Sage, 2000). It is generally only the â€Å"direct treatment provider that has the legal right to obtain consent from the patient, and such a person should be â€Å"one that treats a patient directly, rather than based on the orders of another provider, and/or provides health care services or test results directly to patients.   Ã‚  Ã‚  Ã‚   An authorization differs in that it offers requests for permissions to patients in a fashion more tailored to suit them and their health needs. This offers permissions to use specific portions of a patient’s PHI for detailed and specific purposes. Such purposes are usually for things that are unrelated to the TPO or for disclosure to be done with a specified third party. Authorizations expire, while consent forms are more open concerning the time-frame in which information might be used or disclosed. Further stipulations include the fact that â€Å"covered entities may not condition treatment or coverage on the individual providing an authorization† and that it â€Å"states the purpose for which the information may be used or disclosed† (DHHS, 2001, p. 6). PRIVACY RULES IN THE HEALTH CARE SECTOR   Ã‚  Ã‚  Ã‚   It is highly necessary to have a deeper understanding of what privacy rule entails as a basis for sustaining quality ethical standard especially for someone working in the healthcare sector. In the healthcare industry, privacy is a more delicate issue than other sectors and its workings are very intricate. The background information released from the Office for Civil Rights, (DHHS, 2001; OCR, n.d.) indicates the intricacy of the Privacy Rule, which became effective on April 14, 2001. The Privacy Rule, according to the Department of Health and Human Services, â€Å"provides the first comprehensive federal protection for the privacy of health information† (DHHS, 2001, p. 1).   Ã‚  Ã‚  Ã‚     The different departments within the health care sector have all joined in support of the aims advocated by this rule to protect the privacy of the patient. However, these departments also understand how necessary it is that privacy not interferes with the treatment of patients (DHHS, 2001; OCR, n.d.). The delicacy of the privacy problem becomes even more apparent for other reasons. Though privacy consents and authorizations are generally granted to primary care providers, health care clearing houses and health insurers, it is usually the case that such entities require the aid of yet other entities (such as contractors) in order to provide the best care possible to the patient. To make allowance for the possibility of divulging PHI to such associates, conditions and stipulations are included in the privacy rule for ensuring that the provider obtain satisfactory assurances that the business associate will use the information only for the purposes for which they were engaged by the covered entity, will safeguard the information from misuse, and will help the covered entity comply with the covered entitys duties to provide individuals with access to health information about them and a history of certain disclosures. Therefore, personal health information can only be shared with contractors and associates when such information is necessary for the providers to do their jobs accurately and thoroughly. To facilitate the usefulness of this regulation to the health care officer as well as the individual in securing information in compliance to the ethical requirements, most health care providers must know that they are covered by the new rule and therefore must comply with the new requirements. Analysts have wondered whether these requirements for consent have not presented barriers to the proper treatment of patients, as this often necessitates open consultation with other specialists and health care providers. However, the stipulations of the consent requirements should not hinder such comprehensive treatment, as those providers who had at one time treated the patient would have also been required to obtain such consent. Furthermore, since necessary consultations with other health personnel are considered part of the â€Å"treatment of an individual, it is considered within consensual boundaries to engage in such consultation. Such actions are therefore considered ethical.   Ã‚  Ã‚  Ã‚   The ethical practices in the commercial, technological and other industrial sectors are governed by corporate regulations and social responsibilities. The issues of these sectors differ from those of the health care sector, which deals with the more serious issues of providing medication for human and veterinary sciences, and as such, requires more serious and stringent ethical standard compliance (Hsinchun et al., 2005). PRIVACY IN THE CONTEXT OF E-COMMERCE   Ã‚  Ã‚  Ã‚   The ethical difficulties associated with e-commerce revolve around privacy and identity, both with reference to the human subject involved in the transaction and transaction non refutability (Baum 1998, p.65; Suprina 1997, pp.8–12; Joyanes, 1997, pp.277–281).   Ã‚  Ã‚  Ã‚   The online e-store Amazon (Linden, G., Smith, B. York, J. as cited in Teemu Mutanen) uses consumer data on cross-selling growth and the   information about buying patterns is transformed into recommendations. Chris Anderson as cited in Teemu Mutanen argues that this combination of good-quality recommendations with huge inventory of items is a real business advantage. The advantage is gained only if the customer can be targeted with relevant recommendations, the variety of items is not sufficient. Hence E-commerce organizations tend to use the consumer data they have collected from their visitors through online transactions.   Ã‚  Ã‚  Ã‚   However, the online consumers expect ethics from the e-commerce traders in protecting the privacy of their details.   They want the e-commerce sites to have and to display a highly visible privacy policy, which can be easily understood. They want a prominent page where corrections of past mistakes are available. Berman Mulligan highlights that an internet-user possesses three expectations when online: (1) an expectation of anonymity, (2) an expectation of fairness and control over personal information, and (3) an expectation confidentiality (Berman Mulligan 1999).All three expectations are eliminated through three critical cyberspace practices that are (Gindin, 1997): 1) personal information provided on the Internet, (2) online transactions, and (3) government record keeping. Although each practice provides only a minute description of an individual’s personal life, the slow accumulation of such descriptive material may eventually expose a detailed profile (Mason 1986).   Ã‚  Ã‚  Ã‚   The consumers experiences on the Net concerning their privacy lists several themes. Beth Givens in his presentation, ‘Privacy Expectations in a High Tech World’ outlined the following themes on consumer experiences regarding privacy concerns: The first theme is the invisibility of data capture.   Ã‚  Ã‚  Ã‚   A second theme is the potential ubiquitousness of data gathering, and the ability of data from several sources to be merged to create massive electronic dossiers on individuals. A third theme is invasion. Web sites can capture and track visitors clickstream data by placing small text files called cookies onto their hard drives. Unless users are savvy enough to set their browsers to notify them about the pending placement of a cookie, it is done without the users consent, and its an invisible process. A fourth theme is the fear of harm befalling Internet users – fear, and a fifth theme is confusion over their privacy rights.   Ã‚  Ã‚  Ã‚   The problem of privacy in e-commerce is concerned with the difficulty of securely conveying the information required for online transactions (Suprina, 1997 as cited in A.J.G. Sison).   Ã‚  Ã‚  Ã‚   Information technology and computer professionals began seriously considering the long-term effects of computer ethics in the late 1980s and early 1990s. They recognized the need to organize professionally through such bodies as the Association for Computing Machinery and the Institute of Electrical and Electronics Engineers to devise professional codes of conduct. However, the increasing proliferation of powerful computers in the hands of nonprofessionals widens the scope of potential problems. PRIVACY AND ETHICAL INFORMATION AMBIGUITY Ethical ideologists have confusing opinions most of the time, and such problems can actually undermine ethical practices (Budd, 2005). In one profession, an action which is not ethically sound may not even be considered an offense in law. In many cases, there is no clear demarcation as to what is ethically wrong and what is legally offensive.   Ã‚  Ã‚  Ã‚   These are some problems encountered by those who practice in the healthcare field, and there exists by no means a consensus on what should be done in such cases (AMA, 1994). For example, economic ethical theorists believe it is the right of every citizen of a country to access health and medical opportunities, irrespective of his financial status (Budd, 2005).   DISCLOSURE LAW IN HEALTH CARE   Ã‚  Ã‚  Ã‚   It must be agreed that the health sector is one of the most delicate and even complicated sectors of the national economy, and that it requires handling with utmost care. It is intimately concerned with handling the most delicate areas of personal information, as it is involved in the documentation of health records, and the treatment and handling of all ailments suffered by persons within society. So, the management of healthcare data requires competence and very high standard of ethics (Agelus, 2004). So here what must also inevitably be considered is the question of drafting laws and regulations to govern how this information can be secured in the best interest of the stakeholders (Morejon, 2006). Of importance is the question of what the ethical rules are, that govern security of these data and information. Also of importance is the protection of the rights of all concerned, and this is what shall be explored here. Sage (2000) has identified the fact of the extreme popularity of laws that require physicians, hospitals, and other health care organizations to give extensive disclosure privileges to patients and customers.   He continues: â€Å"The main issue that is currently being faced in the health care sector with the laws concerning disclosure is that they are unfocussed†. In the words of Sage (2000), they are â€Å"scattershot, reflecting short-term political compromises or the equities of individual lawsuits rather than a coherent understanding of the purposes served by mandatory disclosure and the conditions necessary to achieve desired effects.† So it is obvious that managing and securing business information is becoming a serious issue from the standpoint of ethics and law. In spite of this fact, persons who advocate disclosure are usually quick to point toward such laws issued concerning federal securities as models for healthcare disclosure laws. However, Sage goes on to point out that â€Å"well-designed information requirements can serve therapeutic goals regarding openness, trust, and participation and can remind physicians and other health professionals of the tensions between their daily practice environment and their overarching ethical obligations† (Sage, 1999).   Ã‚  Ã‚  Ã‚  Ã‚  Therefore, in order to design fitting ethical standards and regulations, the particular idiosyncrasies of the health care industry must be taken into consideration. This will necessitate the prioritizing of such issues as education of the public and overall improvement of performance in as far as social issues may have a bearing on decisions made in health care. Furthermore, financial considerations should not have too great a bearing on the privacy and self-d etermination rights of citizens (Hsinchun et al., 2005). These are some of the basic issues that must be kept in mind in understanding the important role the health care sector is playing in securing and managing information.   Ã‚  Ã‚  Ã‚   Certain practices that may be acceptable in a health care setting are included below under the condition that measures are taken to keep   minimum disclosures and other ways of exposing delicate information (Sage, 2000):   Health care personnel are at liberty to coordinate actions orally for the service of patients when located at nursing stations within a hospital;   Doctors, nurses, and others responsible for patients are allowed to converse about the condition of a patient currently under their care, whether on the phone, in the presence of the patient, with a provider, or with another (authorized) family member;   Doctors and nurses are allowed to converse concerning test results from a   laboratory. They may do so with the patient or just amongst themselves in an area for joint treatment; and   Health care personnel are also allowed to discuss the condition of a patient when involved in rounds dedicated to training when in an institution that facilitates the training of health care workers (Sage, 2000).   Ã‚  Ã‚  Ã‚   Also necessary are ethical measures that govern the language that might be used during the care of a patient. When talking in elevated tones becomes necessary in a less-than-private location, the language used should be carefully tailored and then reinforced as the proper method of oral communication among colleagues.   In the same way, businessmen who may be discussing classified information may not be aware of the ability of a person in another room to hear the details of their private conversation. Nothing forces this hearer to block his ears or otherwise ignore the delicate information being transmitted to him, and as a result he becomes privy to privileged information (Budd, 2005; Sage, 2000).   Ã‚  Ã‚  Ã‚   Self-protection mechanism can be described with the online users when they decide on the choices provided for them without any assistance.   When individuals chooses not reply to â€Å"Spam† e-mail even to request removal from a mailing list since replies indicate to a company that individual’s e-mail account is active and marketable (Navrette, 1998). Such measures protect privacy information by providing steps that may prevent the transmission of personal information to business and criminals. In this protective mechanism, individuals remain in control of their own personal information without the assistance of other groups. ROLE OF HEALTH CARE ADMINISTRATOR   Ã‚  Ã‚  Ã‚   Health care industry is also a business industry including management and administrative responsibilities. The managers of the health care industry are called as health care administrators who take responsibilities for planning, direction, coordination, and supervision and the delivery of health care. Unlike the administrators in other industries, health care managers include specialists and generalists. Generalists manage or help manage an entire facility or system, while specialists are in charge of specific clinical departments or services.   Ã‚  Ã‚  Ã‚   Due to the rapid changing in the structure, technology adaptations, evolving integrated health care delivery systems, an increasingly complex regulatory environment, restructuring of work, and an increased focus on preventive care, the role of the health care administrator is also changing and modifying according to the situation. They are responsible to improve efficiency in health care facilities and the quality of the health care provided.   Ã‚  Ã‚  Ã‚   The health care administrators are responsible for the maintenance of patient records, health plans etc., along with the regular Information System managers. In order to maintain authentication and privacy of such key records, the Healthcare administrators should be flexible with the technology, requirements and the developments in and around the industry. The accurate and continuous maintenance of patient record database lies in the hands of the health care administrator and he should maintain the patient record database accurately and completely.   In addition,   as the health care data is also being shared with others for the purpose of research and compliance practices, the expertise and skill levels of health care administrators have become more crucial in maintaining privacy and ethical practices of the industry.   Ã‚  Ã‚  Ã‚   In this context the health care administrators are often called on to maintain and develop professional standards, procedures, and policies for their institutional activities. The expanding role of the health care administrator includes management of preventive medicine and health care programs, medical and vocational rehabilitation, community health and welfare etc. which needs good leadership and managerial skills along with sound knowledge of policy and protection regulations. CONCLUSION   Ã‚  Ã‚  Ã‚  Ã‚   The review of the literature is also the main research method in this study. As such, it was found in the review that ethical standards in acquiring business information in the healthcare industries are much more rigid and organized compared to the ethical standards in the non-health care industries. Thus, the review   affirms the temporarily the hypothesis of this study. Thus, the next chapter would further discuss and analyze the ethical standards of both industries so as to make a conclusive finding regarding the hypothesis of this study.

Friday, November 15, 2019

Oklahoma City and Low-Tech Terrorism :: Exploratory Essays Research Papers

Oklahoma City and Low-Tech Terrorism    Abstract: Ammonium nitrate can be a very beneficial compound when used correctly. It has allowed American farmers to produce more and better agricultural products for decades. The Oklahoma City bombing revealed ammonium nitrate's dark side, however. That bomb, constructed from basic fertilizer, awakened America to the dangers of the common compound. It also caused America to loose its innocence of domestic terrorism.    On April 21, 1995, America was forced to come to grips with terrorism on a scale never before witnessed on American soil. The bombing of the Murrah Federal Office building in Oklahoma City was the most deadly single act of terrorism ever perpetrated within the United States. Two factors combined to make the Oklahoma City bombing even more sinister and frightening than previous terrorist attacks against Americans: the identity of the alleged terrorists and the relative ease with which the attack was carried out.    In the immediate aftermath of the attack, media speculation focused on the possibility of religious extremists, possibly with the support of rogue Middle Eastern states such as Iran or Libya, having carried out the attack to make a political statement against their avowed enemies the United States. The World Trade Center bombing, the bombing of Pan Am flight 103 over Lockerbie, Scotland, and the bombing of the US Marine Corps barracks in Beirut had all been tied into Middle Eastern politics. When the FBI announced its intentions to prosecute Timothy McVeigh, a former US serviceman, and a couple of American accomplices, America was forced to come to grips with the idea of Americans committing mass terrorist acts against their own government and compatriots.    The initial speculation that focused on the Middle East was based on two principles: motive, an avowed hatred for America, and capability, a proven ability to make bombs and use them. The Oklahoma City bombing, if McVeigh is indeed found guilty, demonstrates that both motive and capability are present right there in America's heartland. As the FBI outlined how it believes the plot transpired, Americans learned just how vulnerable we are to terrorists.    The details of the bombing unfolded quickly. The FBI tracked McVeigh through his rental of a Ryder rental van that was located at the bomb's epicenter. Despite the tremendous force of the explosion, remnants of the van survived. The FBI was able to lift a Vehicle Identification Number, or VIN, from some piece of the 1993 Ford van.

Tuesday, November 12, 2019

Deconstruction

A post-structuralism reading looks into this hierarchy in order to show that is not sustained throughout such works, or showing that he two terms are not oppositional but are interdependent and interrelated (Senators 145). There is philosophical acknowledgement of the fact that what human beings experience and claim to know about this world appear just only as they are understood by the human mind.Hence, there is a division created between the mental appearance and the â€Å"things in themselves. † This sets stage for limitability of such work as incorporates division of the things and the words, condition of discourses for the appearance of things inside our knowledge or the systems of truth versus the real things in the material world.Furthermore Dermis's prose is usually difficult since he IS made aware of the problems of metallurgy, that is, the phrases, terms, metaphors and vocabulary as used in the description of culture and philosophy as expressed in words, and the turn s and twists of metaphor and rhetoric we buy into when making and writing arguments (Wise 89). Deconstruction doesn't mean demolition of truth or reality, but subverting illusions in our ideologies and engage that pretend to raise unquestionable universal or natural grounds for belief and knowledge.

Sunday, November 10, 2019

Contract and Chou Essay

The case scenario under review by our team includes a contract law situation involving a board game company and a game inventor. Big Time Toymaker (BTT) is a board game company which develops, manufactures, and distributes board games, and Chou is the name of the inventor of a new strategy game. In this scenario, what began with a payment made from BTT to Chou for exclusive negotiating rights for 90 days, ended in a change in management at BTT, leading to their company no longer having interest in distributing Chou’s game. Several questions will be asked about the validity of the terms agreed upon by the parties involved, including at what point did the parties have a contract, and what role does the statute of frauds play in this contract? Our objective is to analyze the case scenario, including the previously stated questions, and provide the answers to those and other questions pertaining to the scenario and contract law. Question 1 At what point, if ever, did the parties have a contract? There was mutual agreement between Chou and BTT via verbal agreement, and a subsequent email verifying that an agreement had been tentatively reached. According to the terms of distribution between Chou and BTT a contract was only valid if formalized in writing. An argument may be made that three days prior to the 90 day time limit a mutual agreement was reached and valid via an E-contract law. There was mutual assent between both Chou and BTT. The argument for the other side will state there was never a formalized written contract from either Chou or BTT, only an email with a subject heading stating Strat Deal. Is the email a valid contract? Question 2 What facts may weigh in favor of or against Chou in terms of parties’ objective intent to contract? Facts show that BTT sent an email with a subject heading of Strat Deal with information stating that Chou and BTT have reached an agreement. The writing states that after months of no response from BTT and with no management in place the company no longer wishes to distribute Chou’s intellectual property. Chou was in compliance with BTT at all times regarding issues pertaining to Strat. Chou will allege that there was a contract between himself and BTT that was of mutual assent and under E-contract law the emails were valid. Question 3 Does the fact that the parties were communicating by email have any impact on your analysis in questions 1-2 above? According to CA Civil Code 1624, b 3, a, online contracts are endorsable even if writing is required by the statute of frauds. Communication of contracts is valid under E-contract law. There is no impact on analysis made of above stated questions because of online communication. Question 4 What role does the statute of frauds play in this contract? A key factor in any contract is acceptance, and in this case a verbal agreement had been reached three days before the exclusive negotiation right was expired. Chou then said he was going to draw up the contract. Big Time Toymaker (BTT) then sent Chou an email outlining all of the things that they had agreed upon that would be included in the contract. Seeing the email, Chou then assumed that this was the contract to be enforced and did not respond to BTT. Even though Chou received the email, he did not respond to it, thereby giving Chou the defense that silence is never acceptance. However, in E-contact law dictated by CA Civil Code 1624, b, 3, a, it says that online contracts are endorsable even if writing is required by the statute of frauds. In addition, the â€Å"Click On† or â€Å"Click Wrap† agreement clause states that these agreements are enforceable since the opportunity to read and acknowledge was given. The statutes of frauds do play a part in this contract due to the Uniform Commercial Code requiring that the statute of frauds applies to any contract for the sale of goods for $500 or more. However, the exact amount of â€Å"Strat† units that Big Time Toymaker (BTT) will sell or at what cost of each unit is unclear to the reader, it was described in detail in the email BTT sent to Chou. Question 5 Could BTT avoid this contract under the doctrine of mistake? Explain. The new management at BTT cannot avoid this contract under the doctrine of mistake because a mistake was not made by both Chou and the old management team. The mistake by Chou was accepting the email outline of the contract terms as an actual contract agreed to by both parties. Scienter applies to Chou in this case by accepting a seemingly legitimate contract. Would either party have any other defenses that would allow the contract to be avoided? The change of management brought about individuals bound to the same company as the old management team was, therefore, scienter applies to the new management team in privity. The draft sent from Chou and received by BTT is a negotiable instrument. BTT thereby becomes a holder in due course. The inaction of BTT after the draft was sent is in violation of the UCC requirement that all offers are to be open for a reasonable period of 90 days. Chou was under the impression that a contract had been made before that 90 days had expired. Chou has real defense as well as personal defense due to breach of contract and fraud. Question 6 Assuming, arguendo, that this e-mail does constitute an agreement, what consideration supports this agreement? By law, statute of frauds would support this agreement. Due to the terms, there cannot be a lawsuit that can be upheld on particular contracts or arrangements, except if it is written and signed by the authorized party or representative. Under the statute, certain kinds of contracts have to be in writing in order to be enforceable in a court of law (Contracts: Statute of Frauds, 2013). The writing also has to be signed by the person who is held responsible for the contract or by that person’s agent. To evade the justification of the Statute of Frauds, one would need to make sure the contracts are in text and signed by the other party; so, if the opposing party does not hold his or her end of the agreement, one would gain from that particular party. Question Assuming BTT and Chou have a contract, and BTT has breached the contract by not distributing the game, discuss what remedies might or might not apply. It is obvious BTT’s manager did not think clearly about protecting BTT from liability. He carelessly wrote the emails, and his careless actions put BTT at risk. This led Chou to believe that this e-mail was meant to replace the earlier notion that he should draft a contract. Although the word contract was not ever used in the e-mail, it said that all of the terms had been agreed upon. The compensation would be awarded to Chou by the court in a civil action due to the wrongful conduct, being the breach from the other party, BTT. If the contract is breached by BTT, Chou will be granted equitable relief by the court, which comes in the form of specific performance, injunctive relief, or reformation. Monetary damages could also be in effect, in which they can be compensatory, resulting from a loss due to nonperformance. Also, consequential, which are indirect but to be expected from non-completion. Restitution would also take place that would be equivalent to total the party has been unfairly supplemented by the non-breaching party, and liquidated, which damages are a preset value rendering from the agreement. The compensatory damages for recovery Chou suffered by the non-breaching party would be the damages that would be awarded to the party in the same situation he would have been in if the other party had executed as agreed upon (Melvin, 2011). After review of the case scenario involving Big Time Toymaker and Chou the game inventor, we have concluded that not only was there a contract agreement between the parties, but that according to E-contract law, Chou may be bound by the terms included in the original email sent from BTT. In addition, the doctrine of mistake cannot be used in this situation because of scienter toward Chou and the old and new management of BTT. Several questions were asked of our team in accordance with contract law and the scenario provided by the textbook. This completes our analysis of the scenario and answers to the questions we were presented.

Friday, November 8, 2019

Coordination Number Definition in Chemistry

Coordination Number Definition in Chemistry The coordination number of an atom in a molecule is the number of atoms bonded to the atom. In chemistry and crystallography, the coordination number describes the number of neighbor atoms with respect to a central atom. The term was originally defined in 1893 by Swiss chemist Alfred Werner (1866–1919). The value of the coordination number is determined differently for crystals and molecules. The coordination number can vary from as low as 2 to as high as 16. The value depends on the relative sizes of the central atom and ligands and by the charge from the electronic configuration of an ion. The coordination number of an atom in a molecule or polyatomic ion is found by counting the number of atoms bound to it (note, not by counting the number of chemical bonds). Its more difficult to determine chemical bonding in solid-state crystals, so the coordination number in crystals is found by counting the number of neighboring atoms. Most commonly, the coordination number looks at an atom in the interior of a lattice, with neighbors extending in all directions. However, in certain contexts crystal surfaces are important (e.g., heterogeneous catalysis and material science), where the coordination number for an interior atom is the bulk coordination number and the value for a surface atom is the surface coordination number. In coordination complexes, only the first (sigma) bond between the central atom and ligands counts. Pi bonds to the ligands are not included in the calculation. Coordination Number Examples Carbon has a coordination number of 4 in a methane (CH4) molecule since it has four hydrogen atoms bonded to it.In ethylene (H2CCH2), the coordination number of each carbon is 3, where each C is bonded to 2H 1C for a total of 3 atoms.The coordination number of diamond is 4, as each carbon atom rests at the center of a regular tetrahedron formed by four carbon atoms. Calculating the Coordination Number Here are the steps for identifying the coordination number of a coordination compound. Identify the central atom in the chemical formula. Usually, this is a transition metal.Locate the atom, molecule, or ion nearest the central metal atom. To do this, find the molecule or ion directly beside the metal symbol in the chemical formula of the coordination compound. If the central atom is in the middle of the formula, there will be neighboring atoms/molecules/ions on both sides.Add the number of atoms of the nearest atom/molecule/ions. The central atom may only be bonded to one other element, but you still need to note the number of atoms of that element in the formula. If the central atom is in the middle of the formula, youll need to add up the atoms in the entire molecule.Find the total number of nearest atoms. If the metal has two bonded atoms, add together both numbers, Coordination Number Geometry There are multiple possible geometric configurations for most coordination numbers. Coordination Number 2- linearCoordination Number 3- trigonal planar (e.g., CO32-), trigonal pyramid, T-shapedCoordination Number 4- tetrahedral, square planarCoordination Number 5- square pyramid (e.g., oxovanadium salts, vanadyl VO2), trigonal bipyramid,  Coordination Number 6- hexagonal planar, trigonal prism, octahedralCoordination Number 7- capped octahedron, capped trigonal prism, pentagonal bipyramidCoordination Number 8- dodecahedron, cube, square antiprism, hexagonal bipyramidCoordination Number 9- three-face centered trigonal prismCoordination Number 10- bicapped square antiprismCoordination Number 11- all-faced capped trigonal prismCoordination Number 12- cuboctahedron (e.g., Ceric ammonium nitrate -(NH4)2Ce(NO3)6)

Tuesday, November 5, 2019

Draft Essay Rough

Draft Essay Rough Draft Essay Rough Draft Essay Rough: Useful Pieces of Advice Do not fall into despair when you switch to a computer in order to start up your draft essay rough and you see nothing except blank computer screen. Each writer starts his or her writing from this very stage and with the same kind of despair. Of course, you may get thousands of some other desires such as to go for a walk with your dog or to clean your refrigerator, for example, just in order to postpone the process of writing, however, the only way to get rid of these desires and to make yourself working is to start your draft essay rough write immediately. Of course, it is very difficult to start your work from the very beginning when there is nothing written concerning the topic of your assignment yet. However, until you start up the campaign of draft essay rough writing, you will never succeed in coping with your assignment: Do Not Hesitate To Start Writing Take a long breath and start writing. Remember that you do not have to write a perfect draft essay rough from the first time. If your deadline does not face you, you can take your time and rewrite your draft essay rough for several times until you like it. There is no any rush when the deadline is far away from you, that is why it is recommended not to drag things out and to start dealing with your draft essay rough at that very moment when you have received such a task. After you have written draft essay rough and you liked it, do not think that this is the end of your work. If you really want to succeed in your draft essay rough writing, proofread it and correct all the existing mistakes. You see if your draft essay rough is written in a perfect way, however, it includes some of grammar mistakes you will never receive a high grade for your task completing. Rough Draft Is Not The Final Version! Do not waste a lot of time to choose the words for draft essay writing. As a rule, when a person starts worrying for his or her lexis or grammar from the very beginning of writing, it becomes very difficult for him or her to complete this work, as he or she makes different corrections and insertions all the time and does not have an opportunity to proceed with work. Write down all the thoughts you have, you will have an opportunity to edit them later. We hope our pieces of advice will help you in your own draft essay rough writing. Read more: Psychology Papers Problem and Solution Essay Merchant of Venice Critical Essay Jane Eyre Essay How to Make a Reaction Paper

Sunday, November 3, 2019

Political Economy - Neo-Liberalism vs. Classic Liberalism Essay

Political Economy - Neo-Liberalism vs. Classic Liberalism - Essay Example Neo-liberalism aimed to prevent and control monopoly situations such that if there are no bodies in the state of power that can execute the law to preserve the innocent and restrain the offenders, anyone in the state of nature may punish another person for any evil he or that he or she has done since neo-liberalism supports equality. It ensures that there is no superiority or jurisdiction over one another. Contrary, classic liberalism promotes monopoly of power by removing the free exercise of human ingenuity. Classic liberalism argues that when man was denied the free exercise, man became rapidly able to satisfy ever-widening range of desires. Classic liberalism emphasizes that, only the government that holds the enormous control of any good or evil in the society and man should not take law in their hands (Friedrich 2-5). Classic liberalism holds that there is nothing in the basic principle of liberalism to deter making changes on the law of nature. It emphasizes that there are no fixed rules fixed finally such that these rules cannot be reversed or changed. Fixed rules are regarded to be ineffective and confer immediate and obvious benefits only on some people since it has a strong favors to certain people. Neo-liberalism does not encourage the concept of individualism. It emphasizes that on has the authority to destroy another person who ought to do harm to the society although no man is supposed to harm another innocent man. One has to try as much as possible to try to preserve the rest of humankind from any evil that can happen to the other people. Neo-liberalism emphasizes that all being are equal and independent and no man is supposed to harm each other’s innocent life, health or possession as it recognizes all being as workmanship of on omnipotent (God). Moreover, no man that has the liberty to destroy himself and man should not have more than other hence encourage sharing such thing as power. For